首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1986篇
  免费   163篇
  国内免费   6篇
电工技术   24篇
综合类   2篇
化学工业   541篇
金属工艺   44篇
机械仪表   33篇
建筑科学   79篇
能源动力   72篇
轻工业   243篇
水利工程   6篇
石油天然气   2篇
无线电   211篇
一般工业技术   395篇
冶金工业   52篇
原子能技术   36篇
自动化技术   415篇
  2024年   1篇
  2023年   18篇
  2022年   38篇
  2021年   65篇
  2020年   51篇
  2019年   45篇
  2018年   62篇
  2017年   72篇
  2016年   67篇
  2015年   78篇
  2014年   103篇
  2013年   160篇
  2012年   137篇
  2011年   221篇
  2010年   146篇
  2009年   135篇
  2008年   127篇
  2007年   86篇
  2006年   89篇
  2005年   79篇
  2004年   59篇
  2003年   63篇
  2002年   45篇
  2001年   24篇
  2000年   20篇
  1999年   30篇
  1998年   17篇
  1997年   12篇
  1996年   24篇
  1995年   7篇
  1994年   17篇
  1993年   17篇
  1992年   9篇
  1991年   5篇
  1990年   5篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   3篇
  1984年   3篇
  1983年   2篇
  1982年   2篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
排序方式: 共有2155条查询结果,搜索用时 953 毫秒
141.
This paper investigates the modeling of styrene free radical polymerization in two different types of microreactor. A multiphysics model which simultaneously takes into account the hydrodynamics, thermal and mass transfer (convection, diffusion and chemical reaction) is proposed. The set of partial differential equations resulting from the model is solved with the help of the finite elements method either in a 2D or a 3D approach. The different modeled microreactors are on one hand an interdigital multilamination microreactor with a large focusing section, and on the other hand a simple T-junction followed by a straight tube with three different radii. The results are expressed in terms of reactor temperature, polydispersity index, number-average degree of polymerization and monomer conversion for different values of the chemical species diffusion coefficient. It was found that the 2D approach gives the same results as the 3D approach but allows to dramatically reduce the computing time. Despite the heat released by the polymerization reaction, it was found that the thermal transfer in such microfluidic devices is high enough to ensure isothermal conditions. Concerning the polydispersity index, the range of diffusion coefficients over which the polydispersity index can be maintained close to the theoretical value for ideal conditions increases as the tube reactor radius decreases. The interdigital multilamination microreactor was found to act as a tubular reactor of 0.78 mm ID but with a shorter length. This underlines that the use of microfluidic devices can lead to a better control of polymerization reactions.  相似文献   
142.
143.
Trimmed bagging   总被引:1,自引:0,他引:1  
Bagging has been found to be successful in increasing the predictive performance of unstable classifiers. Bagging draws bootstrap samples from the training sample, applies the classifier to each bootstrap sample, and then averages over all obtained classification rules. The idea of trimmed bagging is to exclude the bootstrapped classification rules that yield the highest error rates, as estimated by the out-of-bag error rate, and to aggregate over the remaining ones. In this note we explore the potential benefits of trimmed bagging. On the basis of numerical experiments, we conclude that trimmed bagging performs comparably to standard bagging when applied to unstable classifiers as decision trees, but yields better results when applied to more stable base classifiers, like support vector machines.  相似文献   
144.
Polycrystalline Boron-doped ZnO films deposited by low pressure chemical vapor deposition technique are developed for their use as transparent contacts for thin-film silicon solar cells. The size of the columnar grains that constitute the ZnO films is related to their light scattering capability, which has a direct influence on the current generation in thin-film silicon solar cells. Furthermore, if the doping level of the ZnO films is kept below 1 × 1020 cm− 3, the electron mobility can be drastically enhanced by growing large grains, and the free carrier absorption is reduced. All these considerations have been taken in account to develop ZnO films finely optimized for the fabrication of microcrystalline thin-film silicon solar cells. These TCO allow the achievement of solar cell conversion efficiencies close to 10%.  相似文献   
145.
This paper presents a new circuit architecture for turbo decoding, which achieves ultra high data rates when using product codes as error correcting codes. This architecture is able to decode product codes using binary BCH or m-ary Reed Solomon component codes. The major advantage of our full-parallel architecture is that it enables the memory block between each half-iteration to be removed. In fact, the proposed architecture opens the way to numerous applications such as optical transmission. In particular, our block turbo decoding architecture can support optical transmission at data rates above Gbit/s  相似文献   
146.
Advances in wireless sensing and actuation technology allow embedding significant amounts of application logic inside wireless sensor networks. Such active WSN applications are more autonomous, but are significantly more complex to implement. Event-based middleware lends itself to implementing these applications. It offers developers fine-grained control over how an individual node interacts with the other nodes of the network. However, this control comes at the cost of event handlers which lack composability and violate software engineering principles such as separation of concerns. In this paper, we present CrimeSPOT as a domain-specific language for programming WSN applications on top of event-driven middleware. Its node-centric features enable programming a node’s interactions through declarative rules rather than event handlers. Its network-centric features support reusing code within and among WSN applications. Unique to CrimeSPOT is its support for associating application-specific semantics with events that carry sensor readings. These preclude transposing existing approaches that address the shortcomings of event-based middleware to the domain of wireless sensor networks. We provide a comprehensive overview of the language and the implementation of its accompanying runtime. The latter comprises several extensions to the Rete forward chaining algorithm. We evaluate the expressiveness of the language and the overhead of its runtime using small, but representative active WSN applications.  相似文献   
147.
Given a graph G=(V,E) and a positive integer k, an edge modification problem for a graph property Π consists in deciding whether there exists a set F of pairs of V of size at most k such that the graph $H=(V,E\vartriangle F)$ satisfies the property Π. In the Π edge-completion problem, the set F is constrained to be disjoint from E; in the Π edge-deletion problem, F is a subset of E; no constraint is imposed on F in the Π edge-editing problem. A number of optimization problems can be expressed in terms of graph modification problems which have been extensively studied in the context of parameterized complexity (Cai in Inf. Process. Lett. 58:171–176, 1996; Fellows et al. in FCT, pp. 312–321, 2007; Heggernes et al. in STOC, pp. 374–381, 2007). When parameterized by the size k of the set F, it has been proved that if Π is a hereditary property characterized by a finite set of forbidden induced subgraphs, then the three Π edge-modification problems are FPT (Cai in Inf. Process. Lett. 58:171–176, 1996). It was then natural to ask (Bodlaender et al. in IWPEC, 2006) whether these problems also admit a polynomial kernel. in polynomial time to an equivalent instance (G′,k′) with size bounded by a polynomial in k). Using recent lower bound techniques, Kratsch and Wahlström answered this question negatively (Kratsch and Wahlström in IWPEC, pp. 264–275, 2009). However, the problem remains open on many natural graph classes characterized by forbidden induced subgraphs. question to characterize for which type of graph properties, the parameterized edge-modification problems have polynomial kernels. Kratsch and Wahlström asked whether the result holds when the forbidden subgraphs are paths or cycles and pointed out that the problem is already open in the case of P 4-free graphs (i.e. cographs). This paper provides positive and negative results in that line of research. We prove that Parameterized cograph edge-modification problems have cubic vertex kernels whereas polynomial kernels are unlikely to exist for the P l -free edge-deletion and the C l -free edge-deletion problems for l?7 and l≥4 respectively. Indeed, if they exist, then NP?coNP/poly.  相似文献   
148.
This paper deals with the optimization of a cross-docking system. It is modeled as a three-stage hybrid flowshop, in which shipments and orders are represented as batches. The first stage corresponds to the receiving docks, the second stage corresponds to the sorting stations, and the third stage corresponds to the shipping docks. The objective of the problem is to find a schedule that minimizes the completion time of the latest batch. In order to obtain good quality feasible solutions, we have developed several heuristic schemes depending on the main stage considered, and several rules to order the batches in this stage. Then, we propose a branch-and-bound algorithm that takes into account the decomposition of the problem into three stages. To evaluate the heuristics and to reduce the tree size during the branch-and-bound computation, we also propose lower bounds. Finally, the computational experiments are presented to demonstrate the efficiency of our heuristics. The results show that the exact approach can solve instances containing up to 9–10 batches in each stage (i.e., up to 100 jobs). In addition, our heuristics were evaluated over instances with up to 3000 jobs, and they can provide good quality feasible solutions in a few seconds (i.e., less than 2 s per heuristic).  相似文献   
149.
This article presents a novel application of grammatical inference techniques to the synthesis of behavior models of software systems. This synthesis is used for the elicitation of software requirements. This problem is formulated as a deterministic finite-state automaton induction problem from positive and negative scenarios provided by an end user of the software-to-be. A query-driven state merging (QSM) algorithm is proposed. It extends the Regular Positive and Negative Inference (RPNI) and blue-fringe algorithms by allowing membership queries to be submitted to the end user. State merging operations can be further constrained by some prior domain knowledge formulated as fluents, goals, domain properties, and models of external software components. The incorporation of domain knowledge both reduces the number of queries and guarantees that the induced model is consistent with such knowledge. The proposed techniques are implemented in the ISIS tool and practical evaluations on standard requirements engineering test cases and synthetic data illustrate the interest of this approach.  相似文献   
150.
The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities.In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号